CVE-2025-67709: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI Analysis
Technical Summary
CVE-2025-67709 is a stored cross-site scripting (XSS) vulnerability identified in Esri ArcGIS Server versions 11.4 and earlier, including version 10.9.1, running on both Windows and Linux platforms. The vulnerability stems from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the server fails to adequately sanitize user-supplied input before incorporating it into web pages, allowing an attacker to inject malicious scripts that are stored persistently on the server. When a victim accesses the compromised web page, the malicious script executes within their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The attack vector requires no authentication (AV:N) but does require user interaction (UI:R), such as visiting a maliciously crafted page or resource. The vulnerability has a CVSS v3.1 score of 6.1, reflecting medium severity, with impacts primarily on confidentiality and integrity, but no direct impact on availability. No public exploits have been reported yet, but the presence of this vulnerability in widely deployed geospatial server software poses a significant risk, especially for organizations relying on ArcGIS Server for critical mapping and spatial data services. The vulnerability affects multiple versions and operating systems, increasing the scope of potential exploitation. The lack of available patches at the time of reporting necessitates immediate mitigation through input validation and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67709 could be significant, particularly for those in sectors relying heavily on geospatial data, such as government agencies, utilities, transportation, environmental monitoring, and defense. Exploitation could lead to unauthorized disclosure of sensitive spatial data or manipulation of user sessions, undermining trust in critical mapping services. Confidentiality breaches could expose sensitive location-based information, while integrity impacts could allow attackers to inject misleading or malicious data into geospatial applications. Although availability is not directly affected, the reputational damage and potential regulatory consequences under GDPR for data breaches could be substantial. The vulnerability's ease of exploitation without authentication increases risk, especially in public-facing ArcGIS Server deployments. European organizations with limited web application security controls or insufficient monitoring may be more vulnerable to targeted attacks leveraging this XSS flaw.
Mitigation Recommendations
1. Apply official patches from Esri as soon as they become available to address the vulnerability directly. 2. Implement strict input validation and output encoding on all user-supplied data within ArcGIS Server configurations to prevent injection of malicious scripts. 3. Employ Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting ArcGIS Server endpoints. 4. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities in geospatial services. 5. Educate users and administrators about the risks of clicking on untrusted links or uploading unverified files to the server. 6. Monitor server logs and network traffic for unusual activity indicative of attempted XSS exploitation. 7. Restrict access to ArcGIS Server management interfaces and limit exposure of public-facing services where possible. 8. Use Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution contexts. 9. Maintain up-to-date backups of critical geospatial data to enable recovery in case of compromise. 10. Coordinate with Esri support and cybersecurity teams to stay informed about emerging threats and mitigation strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2025-67709: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Server
Description
There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-67709 is a stored cross-site scripting (XSS) vulnerability identified in Esri ArcGIS Server versions 11.4 and earlier, including version 10.9.1, running on both Windows and Linux platforms. The vulnerability stems from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the server fails to adequately sanitize user-supplied input before incorporating it into web pages, allowing an attacker to inject malicious scripts that are stored persistently on the server. When a victim accesses the compromised web page, the malicious script executes within their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The attack vector requires no authentication (AV:N) but does require user interaction (UI:R), such as visiting a maliciously crafted page or resource. The vulnerability has a CVSS v3.1 score of 6.1, reflecting medium severity, with impacts primarily on confidentiality and integrity, but no direct impact on availability. No public exploits have been reported yet, but the presence of this vulnerability in widely deployed geospatial server software poses a significant risk, especially for organizations relying on ArcGIS Server for critical mapping and spatial data services. The vulnerability affects multiple versions and operating systems, increasing the scope of potential exploitation. The lack of available patches at the time of reporting necessitates immediate mitigation through input validation and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67709 could be significant, particularly for those in sectors relying heavily on geospatial data, such as government agencies, utilities, transportation, environmental monitoring, and defense. Exploitation could lead to unauthorized disclosure of sensitive spatial data or manipulation of user sessions, undermining trust in critical mapping services. Confidentiality breaches could expose sensitive location-based information, while integrity impacts could allow attackers to inject misleading or malicious data into geospatial applications. Although availability is not directly affected, the reputational damage and potential regulatory consequences under GDPR for data breaches could be substantial. The vulnerability's ease of exploitation without authentication increases risk, especially in public-facing ArcGIS Server deployments. European organizations with limited web application security controls or insufficient monitoring may be more vulnerable to targeted attacks leveraging this XSS flaw.
Mitigation Recommendations
1. Apply official patches from Esri as soon as they become available to address the vulnerability directly. 2. Implement strict input validation and output encoding on all user-supplied data within ArcGIS Server configurations to prevent injection of malicious scripts. 3. Employ Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting ArcGIS Server endpoints. 4. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities in geospatial services. 5. Educate users and administrators about the risks of clicking on untrusted links or uploading unverified files to the server. 6. Monitor server logs and network traffic for unusual activity indicative of attempted XSS exploitation. 7. Restrict access to ArcGIS Server management interfaces and limit exposure of public-facing services where possible. 8. Use Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution contexts. 9. Maintain up-to-date backups of critical geospatial data to enable recovery in case of compromise. 10. Coordinate with Esri support and cybersecurity teams to stay informed about emerging threats and mitigation strategies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Esri
- Date Reserved
- 2025-12-10T17:22:04.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955a3a5db813ff03e04e4aa
Added to database: 12/31/2025, 10:28:53 PM
Last enriched: 1/7/2026, 11:38:47 PM
Last updated: 1/8/2026, 7:22:44 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.